Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31/07/2022, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe
Resource
win7-20220718-en
8 signatures
150 seconds
General
-
Target
5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe
-
Size
148KB
-
MD5
77178bc166ac26c885d89edd503df9d4
-
SHA1
7be995cf52ca1e8d8907f154f8199024ff7278f2
-
SHA256
5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b
-
SHA512
5683c9d5312bc0e1fdfaf1609b4adb640cdc01be4cc07dee29f958fe22c37df968e8f1d28de0fa85dbc0f6d41723e91a28de84762afb9b26d96f05c9589dd85d
Malware Config
Signatures
-
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 190.138.221.70 Destination IP 190.138.221.70 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat turnedenroll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DDD376C1-A934-4862-A477-420673A0EB55}\4a-be-6e-b9-73-90 turnedenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-be-6e-b9-73-90\WpadDecisionReason = "1" turnedenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-be-6e-b9-73-90\WpadDecision = "0" turnedenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings turnedenroll.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings turnedenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 turnedenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DDD376C1-A934-4862-A477-420673A0EB55}\WpadDecisionReason = "1" turnedenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DDD376C1-A934-4862-A477-420673A0EB55}\WpadDecisionTime = 00da87253aa5d801 turnedenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DDD376C1-A934-4862-A477-420673A0EB55}\WpadDecision = "0" turnedenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DDD376C1-A934-4862-A477-420673A0EB55} turnedenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 turnedenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" turnedenroll.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad turnedenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-be-6e-b9-73-90 turnedenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-be-6e-b9-73-90\WpadDecisionTime = 00da87253aa5d801 turnedenroll.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections turnedenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 turnedenroll.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DDD376C1-A934-4862-A477-420673A0EB55}\WpadNetworkName = "Network 3" turnedenroll.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1816 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe 1000 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe 1940 turnedenroll.exe 1476 turnedenroll.exe 1476 turnedenroll.exe 1476 turnedenroll.exe 1476 turnedenroll.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1000 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1000 1816 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe 27 PID 1816 wrote to memory of 1000 1816 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe 27 PID 1816 wrote to memory of 1000 1816 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe 27 PID 1816 wrote to memory of 1000 1816 5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe 27 PID 1940 wrote to memory of 1476 1940 turnedenroll.exe 29 PID 1940 wrote to memory of 1476 1940 turnedenroll.exe 29 PID 1940 wrote to memory of 1476 1940 turnedenroll.exe 29 PID 1940 wrote to memory of 1476 1940 turnedenroll.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe"C:\Users\Admin\AppData\Local\Temp\5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe"C:\Users\Admin\AppData\Local\Temp\5e75a50ef949bde986ee2de4a03d17988bb824dfebb1efc7ff9ef72b49b1e02b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1000
-
-
C:\Windows\SysWOW64\turnedenroll.exe"C:\Windows\SysWOW64\turnedenroll.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\turnedenroll.exe"C:\Windows\SysWOW64\turnedenroll.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1476
-